A proxy approach to e-mail security
β
Ian Brown; C. R. Snow
π
Article
π
1999
π
John Wiley and Sons
π
English
β 106 KB
New Internet applications and new releases of existing Internet applications appear with bewildering rapidity. Adding functionality to such applications can therefore be a time-consuming process. By contrast, Internet protocols are significantly less volatile. In some circumstances, the additional f